Search Results - (( developing information force algorithm ) OR ( java implication rsa algorithm ))
Search alternatives:
- developing information »
- information force »
- java implication »
- force algorithm »
- implication rsa »
- rsa algorithm »
-
1
A real-time algorithm of optical tactile sensor for surface characterization / Nurul Fathiah Mohamed Rosli
Published 2016“…A surface exploration computer algorithm to obtain the sensing information was developed in order to analyse the characteristic of the optical tactile sensor. …”
Get full text
Get full text
Thesis -
2
Optical tactile sensor for robotic assisted surface characterization / Amir Abd Latif
Published 2016“…A new mathematical modelling and computer algorithm is developed and calibrated which are based on image processing methods. …”
Get full text
Get full text
Thesis -
3
-
4
Calibration of optical based silicone tactile sensor based on image deformation technique / Abdul Halim Esa
Published 2016“…Based on these three parameters, three different types of algorithm are developed in order to measure experimentally the forces and deformation based on optical information of the tactile sensor. …”
Get full text
Get full text
Thesis -
5
-
6
Real-time measurement and gait detection algorithm for motion control of active ankle foot orthosis / Aminuddin Hamid
Published 2015“…The Active ankle foot orthosis (AAFO) has been developed to overcome this problem by assisting the motion of the ankle complex based on force controlled actuator. …”
Get full text
Get full text
Thesis -
7
Enhancement of impact force determination with modal transformation method by using integration and data filtering /Khoo Shin Yee
Published 2013“…Additional information about the loads experienced by the structure will aid the development iterations resulting in a better outcome. …”
Get full text
Get full text
Thesis -
8
Mathematical modelling of mass transfer in a multi-stage rotating disc contactor column
Published 2005“…Based on this formulation, a Mass Transfer of A Single Drop (MTASD) Algorithm was designed, followed by a more realistic Mass Transfer of Multiple Drops (MTMD) Algorithm which was later refined to become another algorithm named the Mass Transfer Steady State (MTSS) Algorithm. …”
Get full text
Get full text
Thesis -
9
Securing password authentication using MD5 algorithm
Published 2014“…Process of authentication can be defined as developing a unique mapping process from given password to some other unique information in a defined domain. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Establishment of spectral subtraction-based algorithm for experimental modal analysis under operating condition
Published 2022“…Under the operating condition, the presence of unmeasurable forces causes an error in the transfer function calculation due to incomplete information of input forces. …”
Get full text
Get full text
Thesis -
11
Relationship investigation of handgrip forces with varied wrist angles using forearm EMG for bionic hand
Published 2017“…The information relating handgrip force and wrist position to forearm muscle activity is important as control algorithm for controlling the prostheses or robotic hand gripping force. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Boyer-Moore horspool algorithm used in content management system of data fast searching
Published 2017“…After a deep view on few fast searching algorithm as Boyer-Moore algorithm, Boyer-Moore Horspool algorithm, Brute-Force Algorithm, Knuth-Morris-Pratt algorithm and Rabin-Karp algorithm, this research paper chooses Boyer-Moore Horspool algorithm to used in the content management system in term of data Fast Searching. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
-
14
CAGDEEP : Mobile malware analysis using force atlas 2 with strong gravity call graph and deep learning
Published 2023“…To leverage the existing static analysis techniques, this study proposes CAGDeep, to reflect deep semantic information of malware samples. The novelty of our study lies in the Force Atlas 2 call graph development to capture malware behavior patterns. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…Cryptographic algorithms play an important role in information security where it ensures the security of data across the network or storage. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Development of DNA-based dynamic key-dependent block cipher
Published 2015“…Hence, it is necessary to research and develop a secure symmetric cipher algorithm. Since the declaration of Rijndael as AES this cipher has been the target of many attacks, and the attempts to break it are ongoing and even increasing everyday by taking advantage of the rapid development in computing capabilities. …”
Get full text
Get full text
Thesis -
17
Classification models for higher learning scholarship award decisions
Published 2018“…A dataset of successful and unsuccessful applicants was taken and processed as training data and testing data used in the modelling process. Five algorithms were employed to develop a classification model in determining the award of the scholarship, namely J48, SVM, NB, ANN and RT algorithms. …”
Get full text
Get full text
Get full text
Article -
18
Surface defect detection and polishing parameter optimization using image processing for G3141 cold rolled steel
Published 2016“…To realize this, automatic cropping algorithm is developed to detect the region of interest and interpret the Ga value. …”
Get full text
Get full text
Thesis -
19
-
20
An enhanced fuzzy commitment scheme in biometric template protection
Published 2023“…Phase one, involved research review and analysis, followed by designing conceptual model and algorithm development in phase two and three respectively. …”
Get full text
Get full text
Get full text
Thesis
